Steganography Critical Review

Decent Essays
Purpose This critical review is to investigate steganographic studies and their methods to either exfiltrate data or defend against data exfiltration. Steganography has one main purpose, to conceal data. Huang’s (2011) method, embedding steganographic data in inactive frames of low-bit rate audio streams went against the norm (Aoki, 2008), (Wu et al., 2006), used active frames of high-bit rate audio streams. Active high-bit rate audio streams have higher least significant bit counts, which presents added frames to conceal steganographic payloads (Huang et al., 2011). Howbeit, Huang (2011) demonstrated a new algorithm he administered to (VOIP) inactive frames of low-bit audio streams, which could carry higher capacity payloads than…show more content…
Nagaraja’s (2011) research purpose was to initiate future studies into defensive measures against botnets. Botnets have a unique ability to coordinate the sending and receiving of new commands to bots that grant the botmaster immense power to execute criminal activities, such as, phishing attacks, DDoS attacks, and ransomware attacks (Nagaraja, et al., 2011). Which have intensified to where presently botnets control hundreds of thousands of hosts and produce millions of dollars in revenue for their creators (Nagaraja, et al., 2011). Contrary to traditional botnets, Stegobot’s communication traffic does not open new communication endpoints between the bots (Nagaraja, et al., 2011). Stegobot takes advantage of social media networks by operating along the edges, while utilizing image steganography techniques to hide covert communication during the interchanging of images among users (Nagaraja, et al., 2011). Network traffic visualization method designed by Mazurczyk (2012) focuses on network anomaly detection principles. Mazurczyk’s main purpose of doing his research was to detect anomalies in network traffic flow, that can cause malicious actions that could compromise network security. Typical anomaly detection methods instituted across networks focus on discovering illegal activities orchestrated by probable attackers (Mazurczyk, et al., 2012). Current security devices lack the effectiveness needed in today’s immense traffic volumes that need current real-time
Get Access